General

  • Target

    f21bfd850f3ee651f35a0a763bf7e39777a0cb456d46c7d1715f80551ae515fa.zip

  • Size

    4.2MB

  • MD5

    c7d488cc8afcefefc13e82f04948fbb2

  • SHA1

    c22a3eb202a4a05a2a80a5ed52068ffe05b84abb

  • SHA256

    f21bfd850f3ee651f35a0a763bf7e39777a0cb456d46c7d1715f80551ae515fa

  • SHA512

    77ede7c37304e857c367e1dc9bf31d9d889b8f6d3930fd31406fd2bef723733f7724272d728ec543ed13b313f3dc6f97290eff3a145d8a2b31b86528cbb5e5cc

  • SSDEEP

    98304:+U/1hkJSyotSKA6i6Z/B/FWcLs+H+889BTytuN0WZKQX0pBt3jT0yYFm:+a1hkNo7zZ/B9WcHe889TN7ZK5X1Mm

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • f21bfd850f3ee651f35a0a763bf7e39777a0cb456d46c7d1715f80551ae515fa.zip
    .zip

    Password: infected

  • b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
    .apk android

    angry.grant.doll

    genuine.fever.clerk.ioaWNDIoaD